A survey on cryptographic techniques for protecting big data security: present and forthcoming

被引:0
作者
Siqi Lu
Jianhua Zheng
Zhenfu Cao
Yongjuan Wang
Chunxiang Gu
机构
[1] Information Engineering University,School of Cyberspace Security
[2] Henan Key Laboratory of Network Cryptography Technology,Shanghai Key Laboratory of Trustworthy Computing
[3] Institute of Security Technology,Shanghai Institute of Intelligent Science and Technology
[4] East China Normal University,undefined
[5] Cyberspace Security Research Center,undefined
[6] Peng Cheng Laboratory,undefined
[7] Tongji University,undefined
来源
Science China Information Sciences | 2022年 / 65卷
关键词
big data security; cryptographic techniques; ciphertext-based data sharing and computing; authenticated encryption; functional encryption; homomorphic encryption; secure multi-party computing;
D O I
暂无
中图分类号
学科分类号
摘要
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact the implementation and management of information security and privacy protection. Cryptographic technologies are used to protect the security and entire life cycle of big data. The demand for this technology is multiplied when the data are stored in the cloud. They are stored in the cloud in the form of ciphertext, and the driving requirement for data retrieval, sharing, and manipulation places the security of data at risk. The all-or-nothing approach of traditional cryptography systems cannot realize the release and processing of data information with flexible and increasingly fine granularity. Consequently, dealing with the relationship between privacy protection and data utilization, as well as navigating the blurry boundaries between subverting either plaintext or ciphertext, has become a research focus of the current cryptographic trend for protecting big data security. Presently, there are many studies designed to solve these limitations. First, security requirements and source encryption mode for future big data systems and applications are elaborated. Then, focusing on the practical security and functionality of the big data life cycle, including storage, retrieval, sharing, calculation, statistical analysis, and utilization, the research being conducted based on those functions is reviewed. For each cryptographic technology that meets the requirement of each type of big data security or application, security and efficiency comments and sufficient comparison analyses of cryptography schemes or protocols are provided; moreover, the current general problems and development trends are expounded. Because the current innovative research on cryptographic technology was primarily based on the development or improvement of a single solution, the study on the security of the entire big data life cycle from a holistic perspective is extremely limited. Finally, based on surveys and integration of cryptographic techniques, a compatible and comprehensive reference cryptographic architecture for big data security (Z-CABDS) is proposed, which can be used to guide each sub-direction to cooperate with each other to achieve the full life cycle security of big data. Moreover, certain challenges, open problems, and thoughts on future research related to the cryptography of big data security from the viewpoint of the entire big data life cycle are addressed, including views on information theory, the intersection and fusion of technologies, and new technology derivation, which aims to provide a good reference and inspiration for follow-up research.
引用
收藏
相关论文
共 332 条
[1]  
Jiao L(2020)Stream cipher designs: a review Sci China Inf Sci 63 131101-161
[2]  
Hao Y L(2020)An overview of cryptographic primitives for possible use in 5G and beyond Sci China Inf Sci 63 220301-578
[3]  
Feng D G(2017)Understanding RUP integrity of COLM IACR Trans Symmetric Cryptol 2017 143-26
[4]  
Yang J(2008)Encryption modes with almost free message integrity J Cryptol 21 547-187
[5]  
Johansson T(2017)Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security IACR Trans Symmetric Cryptol 2017 1-24
[6]  
Datta N(2015)Research on the confusion and diffusion properties of the initialization of MORUS J Cryptol Res 45 155-1713
[7]  
Luykx A(2010)Toward publicly auditable secure cloud data storage services IEEE Network 24 19-49
[8]  
Mennink B(2014)Secure and efficient privacy-preserving public auditing scheme for cloud storage Comput Electrical Eng 40 1703-482
[9]  
Jutla C S(2015)Proof of retrievability with public verifiability resilient against related-key attacks IET Inf Security 9 43-1179
[10]  
Naito Y(2015)Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage J Univers Comput Sci 21 473-1375